8
8 What Is An Exploit? Compromised webpage with exploit object 1.Exploit object rendered by vulnerable software2.Exploit injects code into running program memory 3.Control transfers to exploit code Exploit object can be in ANY web page An exploit is NOT the same as the malware executable file! HACKED

21
21 Improve Correlation Between Known and Unknown Threats to Increase Threat Protection and Reduce Costs Consolidated threat defense integrate threat prevention for known and unknown threats, leveraging the MVX engine to provide timely and accurate notifications It allows NX to compete in both APT and IPS market segments Threat validation validate attacks using the MVX engine so time and resource investments are not spent on filtering down the noise It supports custom IPS Snort rules that are widely used in the market for compliance Actionable insights correlate known and unknown threats and derive richer threat intelligence to speed up incident response It provides both client and server IPS protection for known attacks It provides the CVE ID for known attacks that has been detected by MVX FireEye IPS